Share This

Showing posts with label Internet of Things. Show all posts
Showing posts with label Internet of Things. Show all posts

Tuesday, 11 December 2018

Internet Protocol Version 9 第一代互联网 IPv9, Quantum Computing, AI and Blockchain: The Future of IT

https://youtu.be/RACbXf27iQ0 https://youtu.be/JO31OG2IqZI

Internet Protocol Version 9 第一代互联网 IPv9 

Great news and why Washington is harboring so much envy and hatred against China.

After watching the video "National Sovereign Network IPV9 officially unveiled", I realized why cyber security is national security and what enabled the US Government to amass so much wealth from every other country in the world.

Day after day and each time we surf the internet, read our emails, WeChat, QQ, WhatsApp, etc., and use WiFi for whatever reasons including video streaming on smartphones and smartTVs, we have to use the United States Internet protocol IPV4. This is the parent server and the main root server for WWW or the worldwide Internet.

China had signed an agreement with the United States to rent the worldwide Internet for 20 years from the year 2000. Every year, China and the rest of the world have been, and currently still pay rents to the United States monopoly. The annual rents are increasing with the ever rising increase in usage, including 500 billion in 2007 and 1.8 trillion in 2017. By the end of 2020, it is estimated to be even more which is only the rent from China alone! Every other country in the world are also paying rents for Internet usage to the US. How much is that transfer of wealth! How can a country not be rich when it possesses such a humungus monopoly? If the ordinary American people ain’t receiving a share of this fabulous windfall, then their country’s elites like Trump, Clinton, Bush, Wall Street banksters like Goldman Sachs, etc., can perhaps be made to divulge their secret.

Thankfully for China (also quite likely for Third World countries) by 2014, China independently developed the IPV9 parent server and the main root server with independent intellectual property rights. Having achieved this quantum leap, China tried to negotiate with the United States to introduce to the world its new IPV9 protocol. Not surprisingly, it was rejected.

Then in 2015, a team of Chinese delegation of technological experts unveiled and gave a test introduction of IPV9 to members of the UN General Assembly. The team of experts were able to prove that both the security and quality of IPV9 far exceeded that of the United States’s IPV4 and IPV6.

The two nations were then given the opportunity to present their case at the end of which the UN Assembly voted overwhelmingly in favor of China’s IPV9.

After further discussions, the UN General Assembly handed over management of the worldwide internet to China for 100 years. That is to say, when the current lease with the US expires in 2020, China will assume leadership and management of the worldwide internet with its superlative IPV9 parent server and the main root server.

All the receiving and transmitting stations in China have now been completed. To date, 25 countries have signed lease agreements with China with the rest of the world to follow. In 2019, IPV9 will be put into trial operation. When the lease with the US expires in 2020, the old and outdated American IPV4 will be closed and China's new generation Internet, namely the “Internet of Things IPV9”, will be up and running. If Internet IPV4 and IPV6 made the United States brilliant, then the Internet of Things IPV9 will bring immense glory and blessings to China and the rest of the world for the next hundred years!

Quantum Computing, AI and Blockchain: The Future of IT - Talks at Google


https://youtu.be/MozDSajpLTY

Prof. Shoucheng Zhang discusses three pillars of information technology: quantum computing, AI and blockchain. He presents the fundamentals of crypto-economic science, and answers questions such as: What is the intrinsic value of a medium of exchange? What is the value of consensus and how does it emerge? How can math be used to create distributed self-organizing consensus networks to create a data-marketplace for AI and machine learning?

Prof. Zhang is the JG Jackson and CJ Wood professor of physics at Stanford University. He is a member of the US National Academy of Science, the American Academy of Arts and Sciences and a foreign member of the Chinese Academy of Sciences. He discovered a new state of matter called topological insulator in which electrons can conduct along the edge without dissipation, enabling a new generation of electronic devices with much lower power consumption. For this ground breaking work he received numerous international awards, including the Buckley Prize, the Dirac Medal and Prize, the Europhysics Prize, the Physics Frontiers Prize and the Benjamin Franklin Medal.

He is also the founding chairman of DHVC venture capital fund, which invests in AI, blockchain, mobile internet, big data, AR/VR, genomics and precision medicine, sharing economy and robotics.


Related posts:

Huawei CFO arrest violates human rights as US takes aim at Huawei, the real trade war with China

 

Huawei Surprise goldfish in a bowl 

 

  

U.S., China agree trade war ceasefire after Trump, Xi summit

 

China's Chang'e-4 spacecraft, a world's first mission to moon's far side, boosts Beijing a space superpower

 

 

 

Chinese scientists make quantum leap in computing; jumbo passenger jet C919 liftoff ! 

 

 



China successfully launched world's first quantum communication satellite 'very exciting' !

Chinese quantum satellite to protect China from cyber attacks https://youtu.be/iymqNogNxEg

China to build world-leading national laboratory for quantum information sciences



 

What is Blockchain Technology, its uses and applications?

 

 


Monday, 25 December 2017

Protect your IoT devices

The Internet of Things is a big, juicy target for criminals. — Dreamstime/TNS

As more and more devices connect to the Internet, the risk of them being targeted by criminals is also increasing.


Internet-connected devices are nearly ubiquitous, with ­computer circuitry now found in a variety of common appliances. They can include security cameras, DVRs, printers, cars, baby monitors, and refrigerators – even “smart” lightbulbs and clothing. Collectively those devices are called the Internet of Things.

The Internet of Things is a big, juicy target for criminals. Up to a million devices were hijacked to create the Mirai botnet which was used to extort companies and bring a university computer system in New Jersey to its knees. The botnet was later exploited to bring down vast swaths of the Internet in a ­sustained attack on Oct 21, 2016.

Paras Jha, a former Rutgers University student, pleaded guilty Dec 8 with two other men who admitted they wrote the Mirai code. Named after an obscure anime film character, Mirai scoured the Internet for unsecured devices and easily found them.

Once discovered, the Internet of Things devices were hijacked by the Mirai malware and became part of a botnet that launched assaults on Internet service providers and scores of websites. Jha, 21, allegedly monetised the botnet by demanding ransom to call off the attacks, using it to inflate the number of advertising clicks on websites, and renting it out to other hackers for their own nefarious ends.

The attacks on Rutgers’ computer system may have cost the school US$9mil (RM36.70mil), prosecutors said. Rutgers officials told NJ.com the cost of enhancing security was one of the reasons the school hiked tuition in 2016.

When Jha discovered federal investigators were closing in, he released the Mirai source code to the world to cover his tracks. The code is still circulating online and causing damage, according to Brian Krebs, of KrebsOnSecurity.com.

Krebs advises taking these precautions to keep your Internet of Things devices protected:

– Avoid connecting your devices directly to the Internet.

– Change the default credentials to a complex password that only you will know and can remember. – Check the defaults, and make sure things like UPnP (Universal Plug and Play – which can easily poke holes in your fire wall without you knowing it) are disabled.

– Avoid Internet of Things devices that advertise built-in Peer-to-Peer (P2P) capabilities. P2P Internet of things devices are notoriously difficult to secure, and research repeatedly has shown that they can be reachable even through a fire wall remotely over the internet. That’s because they’re configured to continuously find ways to connect to a global, shared network so that people can access them remotely.

– When it comes to Internet of things devices, cheaper is definitely not better. There is no direct correlation between price and security, but history has shown that less expensive devices tend to have the most vulnerabilities.

The US Department of Justice also offers these tips to protect Internet-connected devices.

– Do your research. Consider the security features of your Internet of things devices before buying. If the device uses a password, make sure it allows you to change it.

– Update firmware when available. Internet of Things devices can be susceptible if not regularly patched. Only install updates from known and reputable sites.

– Disconnect your insecure Internet of Things devices. Outdated security? Can’t update passwords? Then unplug it. – Turn off Internet of Things devices when not in use, or periodically if otherwise always on. Malware is stored in memory and can often be erased by turning the device off and back on.

– Protect routers and WiFi networks. Use your router’s built-in fire wall, confirm it’s enabled.

– Avoid using public WiFi to check Internet of things devices from a smartphone.

– Use antivirus and intrusion-detection products.

– Ask for help, or hire help, if you can’t figure out fire walls or how to “segment” your network of Internet of things devices.

Some free online resources can help determine whether your devices are susceptible to being accessed by Mirai or other malware. Be cautious and use only well-known sources.

If you suspect your Internet of things device is infected, turn it off and on again to purge the device’s memory. Change the password. — The Philadelphia Inquirer/Tribune News Services

Source: By Sam Wood Tech News

Related Links:


New digital ‘hurricane’ churns, gathering strength to land blow on the Internet

A massive zombie robotic network, or botnet, has expanded to infect "an estimated million organizations" and could bring corners of the internet to its knees, Check Point Software says. — Sipa USA/TNS Just as hurricane trackers chart storms in the Atlantic before they make landfall, cybersecurity researchers track viral infections that threaten mayhem. They've found a doozy.
 
 

Rightways